Computer Hacking Forensic Investigator

Overview

Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques.

Prerequisites

It is recommended but not required that you attend our CEH class before enrolling into CHFI program.

Training & Exam

Prior to attempting an EC-Council exam, candidates are required to agree to EC-Council Certification Agreement terms and the EC-Council Non-Disclosure Agreement. Candidates should not attempt the exam unless they have read, understood and accepted the terms and conditions in full. By attempting the exam, the candidates signify the acceptance of the EC-Council Candidate Certification Agreement terms. In the event that the candidate does not accept the terms of the agreement, he/she is not authorized by EC-Council to attempt any of its certification exams.

Targeted Audience

The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident